Description
Aiming at supporting its Cyber-Defense team
Customer is looking for candidates who will perform the following tasks:
- Incident response: Manage incidents in a systematic and rigorous way, using the ticketing and workflow systems used for IR, collect relevant information, define technical response, strategy, produce reports
- Forensics and malware analysis, identify, collect artefacts remotely or locally, perform a technical analysis and import the results in the incident response process
- Evaluate log management and security monitoring solutions ( eg: Arcsight, Splunk)
- Support in producing technical documentation and reports, Scripting of processes, procedure related to the field
- Develop system software ( eg: Scripts for searching the data, system analysis, alerting)
Professional experience:
- University Degree
- At least 2 years' experience in the field of incident response
- 8 years in technical security analysis related to security operations ( SOC/CERT/CSIRT, forensics analyst) ideally holding one or more of the following certifications or equivalent): GCIH, GCFF, CISSP, CEH